Dear Readers,
Q1. Choose the odd one out?
(a) Brute force attack
(b) Virtual Reality
(c) Unethical Phreaker
(d) Keystroke logging
Q2. Which of the following is not a type of database?
(a) Hierarchical
(b) Relational
(c) Network
(d) Transition
Q3. Identify the volatile storage device amongst the following devices?
(a) RAM
(b) Hard disc
(c) Magnetic tape
(d) ROM
Q4. In the first generation of computers, they used?
(a) batch processing
(b) multithreading
(c) multiprogramming
(d) networking
Q5. The term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
(a) hacker
(b) analyst
(c) instant messenger
(d) programmer
Q6. By an intranet we mean?
(a) a LAN of an organization
(b) a Wide Area Network connecting all branches of an organization
(c) Corporate computer networks
(d) a network connecting all computers of an organization and using the internet protocol
Q7. A/(n) ___________ is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content?
(a) email
(b) virus
(c) web beacon
(d) spam
Q8. Routers operate at which layer of the OSI model?
(a) physical
(b) transport
(c) network
(d) MAC sublayer of the data link layer
Q9. Bits are packaged into frames at which layer of the OSI model?
(a) Data link
(b) Transport
(c) Physical
(d) Presentation
Q10. What does DOS stand for?
(a) Digital Operating Session
(b) Disk Operating System
(c) Digital operating System
(d) Disk Opening System
You may also like to read:
- http://www.sscadda.com/2017/11/ssc-imd-computer-science-quiz-2017_9.html
In this exam, 100 questions will be asked from General Engineering (GE) section. We are providing quizzes on the alternate basis- Electronics & Telecommunication Engineering / Physics / Computer Science and Information Technology (CS IT). It will help you to score well in GE section.The Examination will be held from 25th to 30th November 2017 in a computer-based pattern.
Q1. Choose the odd one out?
(a) Brute force attack
(b) Virtual Reality
(c) Unethical Phreaker
(d) Keystroke logging
Q2. Which of the following is not a type of database?
(a) Hierarchical
(b) Relational
(c) Network
(d) Transition
Q3. Identify the volatile storage device amongst the following devices?
(a) RAM
(b) Hard disc
(c) Magnetic tape
(d) ROM
Q4. In the first generation of computers, they used?
(a) batch processing
(b) multithreading
(c) multiprogramming
(d) networking
Q5. The term referring to a person who uses his or her expertise to gain access to other people’s computers to get information illegally or do damage?
(a) hacker
(b) analyst
(c) instant messenger
(d) programmer
Q6. By an intranet we mean?
(a) a LAN of an organization
(b) a Wide Area Network connecting all branches of an organization
(c) Corporate computer networks
(d) a network connecting all computers of an organization and using the internet protocol
Q7. A/(n) ___________ is an object embedded in a web page or email, which unobtrusively (usually invisibly) allows checking that a user has accessed the content?
(a) email
(b) virus
(c) web beacon
(d) spam
Q8. Routers operate at which layer of the OSI model?
(a) physical
(b) transport
(c) network
(d) MAC sublayer of the data link layer
Q9. Bits are packaged into frames at which layer of the OSI model?
(a) Data link
(b) Transport
(c) Physical
(d) Presentation
Q10. What does DOS stand for?
(a) Digital Operating Session
(b) Disk Operating System
(c) Digital operating System
(d) Disk Opening System
No comments:
Post a Comment